I'm working on learning the capabilities of the FortiNet SD-WAN features. Using this guide https://community.fortinet.com/t5/FortiGate/Technical-Tip-Configure-IPsec-VPN-with-SD-WAN/ta-p/20984... I've been able to connect SiteA and SiteB, each with multiple ISPs. The SD-WAN features are working correctly and I'm quite happy with the setup. Now I'm bringing SiteC into the picture. SiteC's setup should be no different than SiteB really. The question is at SiteA. When I'm setting up the SD-WAN zone for connections between SiteA and SiteC, do I put the connections under the same zone that's used to connect SiteA and SiteB? Or would I want to create a completely different Zone?
Background, big picture, end game, if it makes any difference, is Hub & Spoke but then enabling the Route Reflection (I believe it's called) so that SiteB and SiteC can talk directly together without all their traffic going through SiteA.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi @LCIT,
If site B and site C are redundant (same internal network), you can put IPsec interfaces in the same zone in site A. But I don't think that is the case for your scenario.
It is better to put IPsec interfaces for site B and site C in separate SDWAN zone on site A. For hub and spoke, please refer to https://community.fortinet.com/t5/FortiGate/Technical-Tip-SD-WAN-support-for-ADVPN/ta-p/189490
Regards,
SiteB and SiteC are separate networks, 192.168.2.0/24 and 192.168.3.0/24. So on SiteA they should be 2 different SDWAN zones. Is that because of routing?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1731 | |
1099 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.